The Latest in IT Security

Posts Tagged ‘remote access’

A new Linux malware that’s “nearly impossible to detect” can harvest credentials and gives attackers remote access and rootkit functionality by acting in a parasitic way to infect targets, researchers said. Researchers from The BlackBerry Research and Intelligence Team have been tracking the malware, the earliest detection of which is from November 2021, security researcher […]

Read more ...

There’s a new malware family in town – and one that attacks Linux systems by concealing itself in legitimate binaries to deliver several backdoor and rootkits. Dubbed FontOnLake, by cybersecurity researchers at ESET, samples of the malware date as far back as May 2020. According to the researchers, the malware makes use of several carefully […]

Read more ...

According to a report released by Honeywell, USB threats that can severely impact business operations increased significantly during a disruptive year when the usage of removable media and network connectivity also grew. Data from the report indicates that 37% of threats were specifically designed to utilize removable media, which almost doubled from 19% in the […]

Read more ...


Categories

MONDAY, DECEMBER 05, 2022
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments